Ethan Black

Hello there!

I boost a lot of posts, but I have a few things to say every now and then.

I am largely fine with boosting posts from people I disagree with even on significant, dividing issues. I usually don't, however, if they actively advocate for these ideas... so it goes :/

#Christian #coding #HaikuOS #Linux #privacy #FOSS #Fediverse #SmashBros #SSBU #LegendOfZelda
#fedi22
Note: social.librem.one doesn't support DMs

golemwire shared a status by 256
never obsolete
256@mastodon.social

The Way Things Work (1994)
Springs

1 day ago
golemwire shared a status by exocomics
Li Chen
exocomics@mastodon.world

launch time!! 🎉

2 days ago
golemwire shared a status by royal
royal
royal@theres.life

Lots of Windows users will find themselves in an unsupported state in October 2025. There needs to be a Linux distribution that really helps Windows users switch.

It needs to discover the username of the primary user from the registry or file system. It needs to install on ntfs (or alongside it). It needs to discover the profiles and bookmarks and cookies and stored passwords of local browsers. It needs to port over the Steam library. It needs to discover the SSIDs for local networks and join them automatically. It needs to discern what the user believes he already needs from his existing Windows install and insert free equivalents.

The current advice of "erase everything and start over" is impractical for the majority of computer users, especially those who don't have a second computer.

The delta is too big for normal folk, not because Linux is hard to use but because computers are hard to use.

I'm picturing something that generates a KDE Plasma panel that imitates the Windows Taskbar, down to where the various pinned items were. Or the Cinnamon equivalent I guess. Most people don't care what OS they run; they just want as little to change as possible.

#linuxDesktop #yearOfTheLinuxDesktop #windows #switchingToLinux

2 days ago
golemwire shared a status by tylnesh
Michal Kohutek
tylnesh@fosstodon.org

Unironically loving the granularity of setting in the #Ubuntu 's reimagining of Windows UAC. All the more reasons to prefer #snap over legacy .deb packages.

October 14, 2024
golemwire shared a status by racheltobac
racheltobac :verified:
racheltobac@infosec.exchange

I just live hacked Arlene Dickinson
(Dragons' Den star - Canada's Shark Tank) by using her breached passwords, social media posts, an AI voice clone, & *just 1 picture* for a deepfake live video call. Thank you Elevate Conference and Mastercard for asking me to demo these attacks live!

https://www.youtube.com/watch?v=ysu7vEkZdN0

What are the takeaways from this Live Hack video with Arlene?

1. Stop reusing passwords - when you reuse your password and it shows up in a data breach, I can then use that password against you everywhere it's reused online and simply log in as you stealing money, access, data, etc.

2. Turn on multi-factor authentication (MFA) - turning on this second step when you log in makes it more obnoxious for me to takeover your accounts. I then have to try and steal your MFA codes from you (or if you use a FIDO MFA solution like a Yubikey etc, I'm likely just plain out of luck and have to move on to another target)!

3. Recognize that AI has made attacks more believable and scalable - will every or even most hacks involve AI? Nope! Most attacks are simple and leverage your breached passwords to log in as you or they attack via phishing over email, text, call, etc.
That being said, it's important to realize that some attackers will attempt to leverage AI, especially if you have an high threat model. Arlene is a star with millions of followers around the world, because of this she has to be extra politely paranoid about those that reach out with sensitive requests!
If someone with a high threat model (in the public eye, job is to wire money, lots of followers on social media, activist/being targeted, etc) receives a call and they're requesting sensitive info or a wire transfer, recognize that the attacker could believably use a voice clone in that call and could even build a believable deepfake for a live video call.
This is not how all attacks work but it's especially important for those with elevated threat models to recognize that AI can be leveraged in attacks to up the believability with voice clones, deepfake video, etc.

What do I mean "be politely paranoid" in this video?
I recommend verifying that people are who they say they are before taking sensitive actions.
- If you have a high threat model and someone calls you and asks for a wire transfer, use another method of communication to confirm it's them before taking action. Chat them, signal message, email, call them back to thwart spoofing using the number you have on file. This catches me 9 times out of 10 when I'm hacking! This is relevant for your work, when you're buying a house, pretty much anytime you need to send money!
- If you receive an email from a board member asking for a copy of a sensitive document, verify that board member is who they say they are with another method of communication before sending over a document with sensitive work details listed on it.

Stay politely paranoid, folks!

October 16, 2024
golemwire shared a status by internetarchive
internetarchive
internetarchive@mastodon.archive.org

Latest update from @brewsterkahle: "Wayback Machine running strong (yippie!).

Still working to bring http://archive.org items & other services online safely.

@internetarchive
team spirits high, but tired."

October 15, 2024
Ethan Black
golemwire@social.librem.one

I got top 8 at my college's monthly #SmashBros tourney! I've been competing for two years, and it is amazing to see all the practice begin to pay off. I'm Golemwire, down there. #SSBU #esports

October 13, 2024